0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (4)
  • R100 - R250 (334)
  • R250 - R500 (1,206)
  • R500+ (9,217)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover): Boisy G Pitre, Bill Loguidice CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover)
Boisy G Pitre, Bill Loguidice
R5,487 Discovery Miles 54 870 Ships in 12 - 17 working days

CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.

The Art of Linux Kernel Design - Illustrating the Operating System Design Principle and Implementation (Hardcover): Li Xiangyang The Art of Linux Kernel Design - Illustrating the Operating System Design Principle and Implementation (Hardcover)
Li Xiangyang
R5,236 Discovery Miles 52 360 Ships in 12 - 17 working days

Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects, but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system, this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery, revealing operating system design guidelines, explaining the BIOS code directly related to the operating system, and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0.11 edition source code as a representation of the Linux basic design, the book illustrates the real states of an operating system in actual operations. It provides a complete, systematic analysis of the operating system source code, as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams, and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state, and left time slice of processes Examines the relationship between process and memory, memory and file, file and process, and the kernel Explores the essential association, preparation, and transition, which is the vital part of operating system Develop a System of Your Own This text offers an in-dep

From Projects to Programs - A Project Manager's Journey (Hardcover): Samir Penkar From Projects to Programs - A Project Manager's Journey (Hardcover)
Samir Penkar
R4,881 Discovery Miles 48 810 Ships in 12 - 17 working days

This is the story of an up-and-coming project manager that has been handed a large program to lead. Follow along as Susan Codwell, Program Manager for FitAtWork Inc., struggles, leads, stumbles, and grows into the role of program manager. Throughout this book you will gain a clear understanding of the core program management processes and components involved.An engaging story of what makes program management effective, From Projects to Programs: A Project Manager's Journey introduces key program management concepts in a manner that is easy to understand. It provides a backstage view into the workings of program management, program organization, team dynamics, and the skills required to manage programs. Presents new ideas on program organization and reporting Identifies the critical skills required of program managers Supplies helpful tips for managing project managers Includes reflections at the end of each chapter that reinforce key concepts Narrated through the eyes of a program manager, the book provides you with the opportunity to experience the ins and outs of real-world program management. Every project team member will find themselves somewhere in this story. Whether you are an aspiring program manager, a successful project manager, or a project team member, this book offers a fascinating glimpse into what it takes to run successful programs in today's business environment.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R4,903 Discovery Miles 49 030 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,898 Discovery Miles 48 980 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,966 Discovery Miles 49 660 Ships in 12 - 17 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R4,920 Discovery Miles 49 200 Ships in 12 - 17 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Leading and Managing Innovation - What Every Executive Team Must Know about Project, Program, and Portfolio Management, Second... Leading and Managing Innovation - What Every Executive Team Must Know about Project, Program, and Portfolio Management, Second Edition (Hardcover, 2nd edition)
Russell D. Archibald, Shane Archibald
R5,175 Discovery Miles 51 750 Ships in 12 - 17 working days

The primary cause of many project failures is that responsible executives, because of their lack of knowledge in project management, fail to demand that their managers and staff properly utilize the well-proven best practices, processes, systems, and tools that are now available in this field. This book remedies this situation by providing executives at all levels with the understanding and knowledge needed to best take advantage of the power of effective project management and thereby lead and manage innovations within their enterprise. In Leading and Managing Innovation: What Every Executive Team Must Know about Project, Program, and Portfolio Management, Second Edition, the authors present concise descriptions of The key concepts underlying project and program management The important characteristics of projects and programs How projects and programs are best governed and managed How to determine if the desired benefits have actually been achieved The book presents a list of 31 reasonable demands that executives can and must place on their staff members to ensure excellence in the way their programs and projects are created, selected for funding, planned, and executed. Placing these demands communicates to the entire enterprise that top management understands what it takes to achieve the best performance possible and fully supports the continuous improvement needed to ensure continued success. Leading and Managing Innovation explains how to measure the project management maturity level of an enterprise, benchmark against competitors, and identify where project management improvements are required. It discusses the many ways that an enterprise can derive substantial success and competitive advantage from increasing its project management maturity level. A helpful quick reference summary of all of the book's key information is included in the final chapter. Ar

Ready Technology - Fast-Tracking New Business Technologies (Hardcover): Stephen J Andriole Ready Technology - Fast-Tracking New Business Technologies (Hardcover)
Stephen J Andriole
R5,180 Discovery Miles 51 800 Ships in 12 - 17 working days

Companies understand that their ability to compete is tied directly to their ability to leverage the very latest technology advances. Fortunately, deploying new technology has never been easier, primarily due to early maturity and cloud delivery. One approach that is helping companies rapidly pilot and affordably deploy new technologies is ready technology, a new category of information technology (IT). This book explains the ready technology adoption process in detail, enabling companies to exploit new technology immediately and effectively. In this book, the author challenges the traditional "requirements-first/technology-second" approach to technology deployment. Espousing a "technology-first/requirements-second" approach, the author explains how business solutions are "discovered" by deploying not studying ready technology. The book covers the latest trends and processes in ready technology. It also describes the characteristics of ready companies and recommends ready technology pilots that should be launched by the following industries: higher education, retail, and healthcare.

The Influential Project Manager - Winning Over Team Members and Stakeholders (Hardcover): Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F The Influential Project Manager - Winning Over Team Members and Stakeholders (Hardcover)
Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F
R5,190 Discovery Miles 51 900 Ships in 12 - 17 working days

If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to develop the power of influence for achieving better project and business results. Filling this need, The Influential Project Manager: Winning Over Team Members and Stakeholders supplies detailed guidance on how to improve your influence skills to achieve better business results. It explains how to set and meet ambitious goals for you, your team, and your stakeholders. The book describes how to listen actively to influence others and details how you can build partnerships that can pay dividends for a lifetime. Each chapter highlights real-world scenarios about a particular subject linked to the influencing skill being covered. Each chapter also includes practical forms, templates, helpful tips, and best practices to help you develop and refine your skills of influence. Details the ten keys to influencing others to support you and your ideas Outlines techniques for improving your listening skills Includes a trust assessment for determining your level of influence and if others see you as trustworthy Demonstrates how to build a network of informal alliances to achieve success Supplying you with the vision of influence from an experienced project manager's perspective, this book will help you procure the informal power required to become a successful influencer. After reading the text and performing the trust assessment, you will gain the understanding required to lead project members down the path to project success.

Security De-Engineering - Solving the Problems in Information Risk Management (Hardcover): Ian Tibble Security De-Engineering - Solving the Problems in Information Risk Management (Hardcover)
Ian Tibble
R4,907 Discovery Miles 49 070 Ships in 12 - 17 working days

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems impacting corporate information risk management. It explains what the problems are, how and why they have manifested, and outlines powerful solutions.Ian Tibble delves into more than a decade of experience working with close to 100 different Fortune 500s and multinationals to explain how a gradual erosion of skills has placed corporate information assets on a disastrous collision course with automated malware attacks and manual intrusions. Presenting a complete journal of hacking feats and how corporate networks can be compromised, the book covers the most critical aspects of corporate risk information risk management. Outlines six detrimental security changes that have occurred in the past decade Examines automated vulnerability scanners and rationalizes the differences between their perceived and actual value Considers security products including intrusion detection, security incident event management, and identity management The book provides a rare glimpse at the untold stories of what goes on behind the closed doors of private corporations. It details the tools and products that are used, typical behavioral traits, and the two types of security experts that have existed since the mid-nineties the hackers and the consultants that came later. Answering some of the most pressing questions about network penetration testing and cloud computing security, this book provides you with the understanding and tools needed to tackle today's risk management issues as well as those on the horizon.

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R5,208 Discovery Miles 52 080 Ships in 12 - 17 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover)
Jesse Varsalone, Matthew McFadden
R5,518 Discovery Miles 55 180 Ships in 12 - 17 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u

Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover): John Y. Hsu Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover)
John Y. Hsu
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach. This comprehensive, practical text provides that critical understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. With its balanced software/hardware perspective and its description of Pentium processors, the book allows readers to acquire practical PC software experience. The text presents a foundation-level set of ideas, design concepts, and applications that fully meet the requirements of computer organization and architecture courses.

The book features a "bottom up" computer design approach, based upon the author's thirty years experience in both academe and industry. By combining computer engineering with electrical engineering, the author describes how logic circuits are designed in a CPU. The extensive coverage of a micprogrammed CPU and new processor design features gives the insight of current computer development.

Computer Architecture: Software Aspects, Coding, and Hardware presents a comprehensive review of the subject, from beginner to advanced levels. Topics include:


o Two's complement numbers o Integer overflow
o Exponent overflow and underflow o Looping
o Addressing modes o Indexing
o Subroutine linking o I/O structures
o Memory mapped I/O o Cycle stealing
o Interrupts o Multitasking
o Microprogrammed CPU o Multiplication tree
o Instruction queue o Multimedia instructions
o Instruction cache o Virtual memory
o Data cache o Alpha chip
o Interprocessor communications o Branch prediction
o Speculative loading o Register stack
o JAVA virtual machine o Stack machine principles

IT Project Management: A Geek's Guide to Leadership (Hardcover): Byron A. Love IT Project Management: A Geek's Guide to Leadership (Hardcover)
Byron A. Love
R5,194 Discovery Miles 51 940 Ships in 12 - 17 working days

This book's author, Byron Love, admits proudly to being an IT geek. However, he had found that being an IT geek was limiting his career path and his effectiveness. During a career of more than 31 years, he has made the transition from geek to geek leader. He hopes this book helps other geeks do the same. This book addresses leadership issues in the IT industry to help IT practitioners lead from the lowest level. Unlike other leadership books that provide a one-size-fits-all approach to leadership, this book focuses on the unique challenges that IT practitioners face. IT project managers may manage processes and technologies, but people must be led. The IT industry attracts people who think in logical ways analytical types who have a propensity to place more emphasis on tasks and technology than on people. This has led to leadership challenges such as poor communication, poor relationship management, and poor stakeholder engagement. Critical IT projects and programs have failed because IT leaders neglect the people component of "people, process, and technology." Communications skills are key to leadership. This book features an in-depth discussion of the communications cycle and emotional intelligence, providing geek leaders with tools to improve their understanding of others and to help others understand them. To transform a geek into a geek leader, this book also discusses: Self-leadership skills so geek leaders know how to lead others by leading themselves first Followership and how to cultivate it among team members How a geek leader's ability to navigate disparate social styles leads to greater credibility and influence Integrating leadership into project management processes The book concludes with a case study to show how to put leadership principles and practices into action and how a

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover)
Preston Deguise
R4,907 Discovery Miles 49 070 Ships in 12 - 17 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the

Podman in Action (Paperback): Daniel Walsh Podman in Action (Paperback)
Daniel Walsh
R1,394 R1,294 Discovery Miles 12 940 Save R100 (7%) Ships in 9 - 15 working days

Discover Podman, a next-generation container engine that manages containers rootlessly and provides extra layers of exceptional security unavailable in Docker and other container platforms. In Podman in Action you will learn how to: Build and run containers in rootless mode Develop and manage pods Use SystemD to oversee a container's lifecycle Work with the Podman service via Python Keep your containers confined using Podman security features Manage containerized applications on edge devices Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. It also demonstrates how, with Podman, you can easily convert containerized applications into Kubernetes-based microservices. about the technology Podman is a daemonless container engine that lets you build and run containers on all Linux distributions, Windows, and MacOS. It supports the fork exec model for running containers, which allows for better integration with a system and makes it easier to run rootless. It also boasts unique advanced features, such as the ability to create and run Pods that are similar to Kubernetes, and execute Kubernetes YAML. And if you're not ready to completely move on from Docker, Podman can run as a service and support the Docker API in a way that works with docker-compose and docker-py. about the reader For developers or system administrators experienced with Linux and the basics of Docker.

Shaping the Future of ICT - Trends in Information Technology, Communications Engineering, and Management (Hardcover): Ibrahiem... Shaping the Future of ICT - Trends in Information Technology, Communications Engineering, and Management (Hardcover)
Ibrahiem M.M.El Emary, Anna Brzozowska
R5,238 Discovery Miles 52 380 Ships in 12 - 17 working days

The International Conference on Communications, Management, and Information Technology (ICCMIT'16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory, models and applications of systems inspired on nature, using computational intelligence methodologies, as well as in emerging areas related to the three tracks of the conference: Communication Engineering, Knowledge, and Information Technology. The best 25 papers to be included in the book will be carefully reviewed and selected from numerous submissions, then revised and expanded to provide deeper insight into trends shaping future ICT.

Responsive Security - Be Ready to Be Secure (Hardcover): Meng Chow Kang Responsive Security - Be Ready to Be Secure (Hardcover)
Meng Chow Kang
R5,345 Discovery Miles 53 450 Ships in 12 - 17 working days

Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. Demonstrates the viability and practicality of the approach in today's information security risk environment Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches Provides comprehensive coverage of the issues and challenges faced in managing information security risks today The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations. Responsive Security: Be Ready to Be Secure examines the theories and knowledge in current literature, as well as the practices, related issues, and dilemmas experienced during the study. It discusses the reflexive analysis and interpretation involved in the final research cycles, and validates and refines the concepts, framework, and methodology of a responsive security approach for managing information security risk in a constantly changing risk environment.

E-Commerce Usability - Tools and Techniques to Perfect the On-Line Experience (Hardcover): David Travis E-Commerce Usability - Tools and Techniques to Perfect the On-Line Experience (Hardcover)
David Travis
R5,336 Discovery Miles 53 360 Ships in 12 - 17 working days

Top performing dotcoms share a common feature. It isn't a new software plug-in or a design gadget or any other piece of technology. These sites share a passionate focus on usability. This book is written by an international usability consultant, writer and trainer who specializes in the design and evaluation of web-based and wireless applications, e-commerce sites and interactive television. The author has worked with a number of blue-chip clients that value usability, including Hewlett-Packard, Thomas Cook, Philips, the Financial Times and Motorola. This guide is designed for software developers, project managers, business analysts and user interface designers, and does not require a background in human factors or usability. E-Commerce Usability: Tools and Techniques to Perfect the On-Line Experience presents a practical, structured, customer-centered design method that encourages innovation yet helps you make sure your final design is still easy to use.

Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback): Daniel Minoli Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback)
Daniel Minoli
R2,190 Discovery Miles 21 900 Ships in 12 - 17 working days

In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking

An Atlas of Edge-Reversal Dynamics (Paperback): V. C. Barbosa An Atlas of Edge-Reversal Dynamics (Paperback)
V. C. Barbosa
R5,337 Discovery Miles 53 370 Ships in 12 - 17 working days

An Atlas Of Edge-Reversal Dynamics is the first in-depth account of the graph dynamics system SER (Scheduling by Edge Reversal), a powerful distributed mechanism for scheduling agents in a computer system. The study of SER draws on strong motivation from several areas of application, and reveals very clearly the emergence of complex dynamic behavior from very simple transition rules. As such, SER provides the opportunity for the study of complex graph dynamics that can be applied to computer science, optimization, artificial intelligence, networks of automata, and other complex systems. In Part 1: Edge-Reversal Dynamics, the author discusses the main applications and properties of SER, provides data from statistics and correlations computed over several graph classes, and gives an overview of the algorithmic aspects of the construction of the catalogue, thus summarizing the methodology and findings of the cataloguing effort. Part 2: The Atlas, comprises the atlas proper-a catalogue of graphical representations of all basins of attraction generated by the SER mechanism for all graphs in selected classes. An Atlas Of Edge-Reversal Dynamics is a unique and detailed treatment of SER. Along with the catalogue, discussions of SER in the contexts of resource-sharing and automaton networks and a comprehensive set of references make this an important resource for researchers and graduate students in graph theory, discrete mathematics, and complex systems.

Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback): Florin Balasa,... Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback)
Florin Balasa, Dhiraj K. Pradhan
R2,207 Discovery Miles 22 070 Ships in 12 - 17 working days

Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more. Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. The algorithmic style of the text should help electronic design automation (EDA) researchers and tool developers create prototype software tools for system-level exploration, with the goal to ultimately obtain an optimized architectural solution of the memory subsystem.

Enterprise-Scale Agile Software Development (Paperback): James Schiel Enterprise-Scale Agile Software Development (Paperback)
James Schiel
R2,210 Discovery Miles 22 100 Ships in 12 - 17 working days

Enterprise-Scale Agile Software Development is the collective sum of knowledge accumulated during the full-scale transition of a 1400-person organization to agile development-considered the largest implementation of agile development and Scrum ever attempted anywhere in the world. Now James Schiel, a certified Scrum trainer and member of the Scrum Alliance, draws from his experience at the helm of that global four-year project to guide you and your organization through the transition. He lends his insight on how you can use Scrum as an organizational framework and implement XP practices to define how software is written and tested. He provides key information and tools to assess potential outcomes and then make the best corresponding choices in any given situation. Schiel sequences chapters to match typical developmental progression, and in addition to practical guidance, he provides a tool kit from which you can take ideas and select what works for you. Covering quality development practices based on ISO 9001, which help you create consistently high-quality software in a cost-efficient manner, this invaluable resource shows you how to- Improve project management practices and product quality assurance Adopt new management methods and requirements Involve your current customers in development, while inviting new ones Much more than a mere "body of knowledge," this volume goes beyond standardizing agile and Scrum practices. It breaks up the process into manageable tasks, illustrating how to set the stage for the change, plan it, and then initiate it. Using the methods and information presented, any organization should be able to achieve a nearly seamless transition to agile.

Word-Processing Technology in Japan - Kanji and the Keyboard (Hardcover): Nanette Gottlieb Word-Processing Technology in Japan - Kanji and the Keyboard (Hardcover)
Nanette Gottlieb
R4,444 Discovery Miles 44 440 Ships in 12 - 17 working days

This book deals with a topical issue relating to the use of script in Japan, one which has the potential to reshape future script policy through the mediation of both orthographic practices and social relations. It tells the story of the impact of one of the most significant technological breakthroughs in Japan in the latter part of this century: the invention and rapid adoption of word-processing technology capable of handling Japanese script in a society where the nature of that script had previously mandated handwriting as the norm. The ramifications of this technology in both the business and personal spheres have been wide-ranging, extending from changes to business practices, work profiles, orthography and social attitudes to writing through to Japan's ability to construct a substantial presence on the Internet in recent years.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Embedded Systems
D.P. Kothari, Shriram K. Vasudevan, … Paperback R1,053 Discovery Miles 10 530
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Linux Bible, Tenth Edition
C Negus Paperback R1,187 Discovery Miles 11 870
My Windows 11 Computer for Seniors
Michael Miller Paperback R589 Discovery Miles 5 890
iOS 14 Programming Fundamentals with…
Matt Neuberg Paperback R1,502 Discovery Miles 15 020
Teach Yourself VISUALLY Zoom
P. McFedries Paperback R561 Discovery Miles 5 610
macOS Monterey For Dummies
B LeVitus Paperback R729 R523 Discovery Miles 5 230
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,865 Discovery Miles 18 650
Ubuntu Linux Bible
D. Clinton Paperback R928 Discovery Miles 9 280
Windows 11 For Dummies
A Rathbone Paperback R542 Discovery Miles 5 420

 

Partners